1. J. Bergbom. 202
2. W. Bian , W. Meng , and Y. Wang . 2019. Poster: Detecting WebAssembly-Based Cryptocurrency Mining . In Proc. ACM SIGSAC Conference on Computer and Communications Security. W. Bian, W. Meng, and Y. Wang. 2019. Poster: Detecting WebAssembly-Based Cryptocurrency Mining. In Proc. ACM SIGSAC Conference on Computer and Communications Security.
3. Block.one. 2021. A blockchain protocol with industry-leading transaction speed and flexible utility. [Online]. Available: https://eos.io/. Block.one. 2021. A blockchain protocol with industry-leading transaction speed and flexible utility. [Online]. Available: https://eos.io/.
4. L. Breidenbach , P. Daian , F. Tramèr , and A. Juels . 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts . In Proc. USENIX Security Symposium. L. Breidenbach, P. Daian, F. Tramèr, and A. Juels. 2018. Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. In Proc. USENIX Security Symposium.
5. J. Chen , X. Xia , D. Lo , J. Grundy , X. Luo , and T. Chen . 2022 . DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode . IEEE Transactions on Software Engineering ( 2022 ). J. Chen, X. Xia, D. Lo, J. Grundy, X. Luo, and T. Chen. 2022. DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Transactions on Software Engineering ( 2022 ).